METHODS AND SYSTEMS RELATING TO BROKERING ASSET DATA
Individuals, families, and organizations all acquire assets ranging from tens to hundreds to tens of thousands. Each asset defines aspects of the acquirer and provides information to third parties as well as for the acquirer. This information includes ownership, asset experiences etc. shared with other users and/or enterprises who made it, support it, appreciate it, etc., the retailer who sold it, those who follow these assets or seek to provide improvements, enhancements, alternatives, etc. or exploit the asset ownership characteristics to target information. However, asset owners generally wish to remain anonymous yet benefit from third party knowledge of their ownership. Accordingly, a system and method of providing asset ownership brokering to derive benefit without providing confidential information to other users and/or enterprises is provided.
This patent application claims the benefit of priority from U.S. patent application Ser. No. 14/860,964 filed Sep. 22, 2015; which itself claims the benefit of priority from U.S. Provisional Patent Application 62/053,265 filed Sep. 22, 2014; and the benefit of priority from U.S. Provisional Patent Application 62/053,376 filed Sep. 22, 2014; the entire contents of each being incorporated herein by reference.
FIELD OF THE INVENTIONThis invention relates to asset data and more particularly to methods of brokering and exploiting that asset data.
BACKGROUND OF THE INVENTIONAn individual will through their life acquire assets both tangible and intangible. In many instances these assets may be a necessity whereas others are a choice based upon a user's desire to acquire an asset or assets from their disposable income, for example. Irrespective of whether an asset is a necessity or not, the choice of that asset by that individual, group or enterprise defines aspects of the individual, group or enterprise as well as provides data that can form the basis upon which to select/filter the individual, group or enterprise etc. In some instances the user, be it an individual, group or enterprise, may make their acquisition of the asset known whereas in other instances the user may not wish to make this knowledge (data) public.
However, this data associated with the assets acquired, and additional data which an individual, group or enterprise collects, creates or links to that asset, whether or not they involve a financial transaction, has value be it to the user themselves or to others. This value may exist for the user in allowing them to track aspects of the assets, such as warranty renewal/membership fees, current asset status, asset or maintenance schedules etc. Alternatively, that value may be in allowing friends or a subset of the public at large to view aspects of the assets or allowing data relating to the asset and the user to be viewed within social networks, bulletin boards, blogs, online communities or made available to other data sources etc. In other instances the value may be derived based upon data relayed to other users and/or enterprises, for example, who may wish to react to or act upon this data and/or changes in this data. The assets could be an item made by a user or one the user acquired/purchased, and the user shares ownership and/or the users asset experiences to other users and/or enterprises who made it, support it, appreciate it, etc., the retailer who sold it, or those who follow these assets, rate your opinions in respect of ownership of assets, or seek to provide improvements, enhancements, alternatives, etc. based upon the asset or exploit the asset ownership characteristics to target information.
However, an individual may have tens, hundreds of tangible assets and thousands of intangible assets and enterprises may possess one or many orders of magnitude more. In other instances the user may wish to remain anonymous whilst benefiting from third party knowledge of their ownership of the asset. Accordingly, it would be provide users with an ability to broker their asset ownership in manner that allows them and others to derive benefit without requiring that the user provide confidential information to a large number of other users and/or enterprises unless they expressly choose to do so rather than being required and/or feeling compelled to provide that information.
Other aspects and features of the present invention will become apparent to those ordinarily skilled in the art upon review of the following description of specific embodiments of the invention in conjunction with the accompanying figures.
SUMMARY OF THE INVENTIONIt is an object of the present invention to address limitations within the prior art relating to asset data and more particularly to methods of brokering and exploiting that asset data.
In accordance with an embodiment of the invention there is provided a method of associating data relating to a purchase made by a user with the user and with at least one of a specific item and specific service.
In accordance with an embodiment of the invention there is provided a method of associating data relating to a purchase made by a user with the user and with at least one of a specific item and specific service in dependence upon the user providing checkout information to a software application that automatically accesses and identifies the specific item within databases associated with at least one of a retailer, a manufacturer, and a distributor based upon information within the checkout information.
In accordance with an embodiment of the invention there is provided a method of associating data relating to a purchase made by a user with the user and with at least one of a specific item and specific service in dependence upon the user providing product information to a brokering service that engages databases of a plurality of manufacturers to identify and associate additional information relating to the at least one of a specific item and specific service with the user.
In accordance with an embodiment of the invention there is provided a method of allowing a user to associate within a single online resource data associated with an asset associated with the user wherein the data associated with the asset is acquired from sources other than the single online resource data.
In accordance with an embodiment of the invention there is provided a method of verifying to a third party associated with online social media content that a poster of content relating to an asset is a legitimate owner of the asset.
In accordance with an embodiment of the invention there is provided a method of displaying to a user of online social media content that a poster of content relating to an asset within the online social media content is a legitimate owner of the asset by verification of the poster's asset with the manufacturer.
In accordance with an embodiment of the invention there is provided a method of providing to a user of online social media content an additional hyperlink relating to an item of posted online content, wherein the additional hyperlink is only provided when the poster of the content relating to an asset within the online social media content is verified as a legitimate owner of the asset by verification of the poster's asset.
In accordance with an embodiment of the invention there is provided a method of adding content to a social media post through providing at least a plurality of glyphs within the social media post, wherein the plurality of glyphs represent predetermined sections of a code.
In accordance with an embodiment of the invention there is provided a method of associating data relating to a purchase made by a user to a brokering service that engages databases of a plurality of manufacturers and services providers who can then query the users entire items or services, or classes and types of specific items or services which known by the invention to be owned by the user and to then provide suggestions to the user for optional items or services for specific items or services known by the invention to be owned by the user but not known to be owned by the user by the manufacturers and services providers making the offer, and to optionally allow the user to receive these offers and by opting to remain anonymous or not throughout the purchase process and remain anonymous after the purchase of the item or service.
In accordance with an embodiment of the invention there is provided a method of associating data relating to previous purchases or services used which the invention knows have been previously made by a user and a brokering service that engages databases of a plurality of manufacturers and services providers who are able to engage the invention to query a user's entire list of items or services, or classes and types of specific items or services which are known by the invention to be owned or used by a user and which are not known by the manufacturers and service providers to be owned or used by the user at the time of engaging the invention, and to then receive from invention matching criteria or suggested needs back to the manufacturers and service providers so as to allow the manufacturers or service producers to provide, by way of the invention, suggestions, advertisements, notifications or purchase offers to the user by way of a notification, advertisement or recommendation for other optional items or services from the manufacturer or service provider for new or related items or services to the users known items and to do so through the invention by not disclosing the actual items and services owned or used by the user or the users name or other private and identifiable information until which time the user completes the purchase of the offered items or service from the manufacturer or service provider and which affords the optional ability during the purchase process to allow the user to disclose their identifiable information to the manufacturer or services provider or to remain anonymous by allowing the invention to broker the knowledge of the item or service purchased by the user and validating the relationship between the user and the manufacturer or services provider via the inventions server and database.
Other aspects and features of the present invention will become apparent to those ordinarily skilled in the art upon review of the following description of specific embodiments of the invention in conjunction with the accompanying figures.
Embodiments of the present invention will now be described, by way of example only, with reference to the attached Figures, wherein:
The present invention is directed to asset data and more particularly to methods of brokering and exploiting that asset data.
The ensuing description provides exemplary embodiment(s) only, and is not intended to limit the scope, applicability or configuration of the disclosure. Rather, the ensuing description of the exemplary embodiment(s) will provide those skilled in the art with an enabling description for implementing an exemplary embodiment. It being understood that various changes may be made in the function and arrangement of elements without departing from the spirit and scope as set forth in the appended claims.
Elements identified within figures having the same reference numeral are the same element, device, assembly, step, process, etc. as originally defined.
A “portable electronic device” (PED) as used herein and throughout this disclosure, refers to a wireless device used for communications and other applications that requires a battery or other independent form of energy for power. This includes devices, but is not limited to, such as a cellular telephone, a smartphone, a personal digital assistant (PDA), a portable computer, pager, a portable multimedia player, a portable gaming console, a laptop computer, a tablet computer, a wearable device, and an electronic reader.
A “fixed electronic device” (FED) as used herein and throughout this disclosure, refers to a wireless and/or wired device used for communications and other applications that requires connection to a fixed interface to obtain power. This includes, but is not limited to, a laptop computer, a personal computer, a computer server, a kiosk, a gaming console, a digital set-top box, an analog set-top box, an Internet enabled appliance, an Internet enabled television, and a multimedia player.
A “wearable device” or “wearable sensor” relates to miniature electronic devices that are worn by the user including those under, within, with or on top of clothing and are part of a broader general class of wearable technology which includes “wearable computers” which in contrast are directed to general or special purpose information technologies and media development. Such wearable devices and/or wearable sensors may include, but not be limited to, smartphones, smart watches, e-textiles, smart shirts, activity trackers, smart glasses, environmental sensors, medical sensors, biological sensors, physiological sensors, chemical sensors, ambient environment sensors, position sensors, neurological sensors, drug delivery systems, medical testing and diagnosis devices, and motion sensors.
An “asset” as used herein may refer to, but is not limited to, anything tangible or intangible that is capable of being owned or controlled by a user. Assets include, but are not limited to, those items commonly referred to as products, property, estate, holdings, possessions, effects, goods, valuables, belongings, and chattels. Assets may include, but not be limited to, vehicles, electronics, appliances, software, electronic content, furniture, sports equipment, jewelry, and clothing.
An “application” (commonly referred to as an “app”) as used herein may refer to, but is not limited to, a “software application”, an element of a “software suite”, a computer program designed to allow an individual to perform an activity, a computer program designed to allow an electronic device to perform an activity, and a computer program designed to communicate with local and/or remote electronic devices. An application thus differs from an operating system (which runs a computer), a utility (which performs maintenance or general-purpose chores), and a programming tools (with which computer programs are created). Generally, within the following description with respect to embodiments of the invention an application is generally presented in respect of software permanently and/or temporarily installed upon a PED and/or FED.
A “social network” or “social networking service” as used herein may refer to, but is not limited to, a platform to build social networks or social relations among people who may, for example, share interests, activities, backgrounds, or real-life connections. This includes, but is not limited to, social networks such as U.S. based services such as Facebook, Google+, Tumblr and Twitter; as well as Nexopia, Badoo, Bebo, VKontakte, Delphi, Hi5, Hyves, iWiW, Nasza-Klasa, Soup, Glocals, Skyrock, The Sphere, StudiVZ, Tagged, Tuenti, XING, Orkut, Mxit, Cyworld, Mixi, renren, weibo and Wretch.
“Social media” or “social media services” as used herein may refer to, but is not limited to, a means of interaction among people in which they create, share, and/or exchange information and ideas in virtual communities and networks. This includes, but is not limited to, social media services relating to magazines, Internet forums, weblogs, social blogs, microblogging, wikis, social networks, podcasts, photographs or pictures, video, rating and social bookmarking as well as those exploiting blogging, picture-sharing, video logs, wall-posting, music-sharing, crowdsourcing and voice over IP, to name a few. Social media services may be classified, for example, as collaborative projects (for example, Wikipedia); blogs and microblogs (for example, Twitter™); content communities (for example, YouTube and DailyMotion); social networking sites (for example, Facebook™); virtual game-worlds (e.g., World of Warcraft™); and virtual social worlds (e.g. Second Life™).
An “enterprise” as used herein may refer to, but is not limited to, a provider of a service and/or a product to a user, customer, or consumer. This includes, but is not limited to, a retail outlet, a store, a market, an online marketplace, a manufacturer, an online retailer, a charity, a utility, and a service provider. Such enterprises may be directly owned and controlled by a company or may be owned and operated by a franchisee under the direction and management of a franchiser.
A “service provider” as used herein may refer to, but is not limited to, a third party provider of a service and/or a product to an enterprise and/or individual and/or group of individuals and/or a device comprising a microprocessor. This includes, but is not limited to, a retail outlet, a store, a market, a retailer, an online marketplace, a manufacturer, an online retailer, a utility, an own brand provider, and a service provider wherein the service and/or product is at least one of marketed, sold, offered, and distributed by the enterprise solely or in addition to the service provider.
A ‘third party’ or “third party provider” as used herein may refer to, but is not limited to, a so-called “arm's length” provider of a service and/or a product to an enterprise and/or individual and/or group of individuals and/or a device comprising a microprocessor wherein the consumer and/or customer engages the third party but the actual service and/or product that they are interested in and/or purchase and/or receive is provided through an enterprise and/or service provider or their designates.
A “user” as used herein may refer to, but is not limited to, an individual or group of individuals whose data may be, but not limited to, monitored, acquired, stored, transmitted, processed and analysed either locally or remotely to the user wherein by their engagement with a service provider, third party provider, enterprise, social network, social media etc. via a dashboard, web service, website, software plug-in, software application, and graphical user interface. This includes, but is not limited to, private individuals, employees of organizations and/or enterprises, members of community organizations, members of charity organizations, men, women, children, teenagers, and animals. In its broadest sense the user may further include, but not be limited to, software systems, mechanical systems, robotic systems, android systems, etc. that may be characterised by data relating to a subset of conditions including, but not limited to, their environment, consumable materials, upgrades, and replacement parts.
“User information” as used herein may refer to, but is not limited to, user behavior information and/or user profile information. It may also include a user's biometric information, an estimation of the user's biometric information, or a projection/prediction of a user's biometric information derived from current and/or historical biometric information.
“Electronic content” (also referred to as “content” or “digital content”) as used herein may refer to, but is not limited to, any type of content that exists in the form of digital data as stored, transmitted, received and/or converted wherein one or more of these steps may be analog although generally these steps will be digital. Forms of digital content include, but are not limited to, information that is digitally broadcast, streamed or contained in discrete files. Viewed narrowly, types of digital content include popular media types such as MP3, JPG, AVI, TIFF, AAC, TXT, RTF, HTML, XHTML, PDF, XLS, SVG, WMA, MP4, FLV, and PPT, for example, as well as others, see for example http://en.wikipedia.org/wiki/List_of_file_formats. Within a broader approach digital content mat include any type of digital information, e.g. digitally updated weather forecast, a GPS map, an eBook, a photograph, a video, a Vine™, a blog posting, a Facebook™ posting, a Twitter™ tweet, online TV, etc. The digital content may be any digital data that is at least one of generated, selected, created, modified, and transmitted in response to a user request, said request may be a query, a search, a trigger, an alarm, and a message for example.
Reference to “content information” as used herein may refer to, but is not limited to, any combination of content features, content serving constraints, information derivable from content features or content serving constraints (referred to as “content derived information”), and/or information related to the content (referred to as “content related information”), as well as an extension of such information (e.g., information derived from content related information).
Reference to a “document” as used herein may refer to, but is not limited to, any machine-readable and machine-storable work product. A document may be a file, a combination of files, one or more files with embedded links to other files, etc. The files may be of any type, such as text, audio, image, video, etc. Parts of a document to be rendered to an end user can be thought of as “content” of the document. A document may include “structured data” containing both content (words, pictures, etc.) and some indication of the meaning of that content (for example, e-mail fields and associated data, HTML tags and associated data, etc.). In the context of the Internet, a common document is a Web page. Web pages often include content and may include embedded information (such as meta-information, hyperlinks, etc.) and/or embedded instructions (such as Javascript, etc.). In many cases, a document has a unique, addressable, storage location and can therefore be uniquely identified by this addressable location such as a universal resource locator (URL) for example used as a unique address used to access information on the Internet.
“Document information” as used herein may refer to, but is not limited to, may include any information included in the document, information derivable from information included in the document (referred to as “document derived information”), and/or information related to the document (referred to as “document related information”), as well as an extensions of such information (e.g., information derived from related information). An example of document derived information is a classification based on textual content of a document. Examples of document related information include document information from other documents with links to the instant document, as well as document information from other documents to which the instant document links.
Referring to
Within the cell associated with first AP 110A the first group of users 100A may employ a variety of PEDs including for example, laptop computer 155, portable gaming console 135, tablet computer 140, smartphone 150, cellular telephone 145 as well as portable multimedia player 130. Within the cell associated with second AP 110B are the second group of users 100B which may employ a variety of FEDs including for example gaming console 125, personal computer 115 and wireless/Internet enabled television 120 as well as cable modem 105. First and second cellular APs 195A and 195B respectively provide, for example, cellular GSM (Global System for Mobile Communications) telephony services as well as 3G and 4G evolved services with enhanced data transport support. Second cellular AP 195B provides coverage in the exemplary embodiment to first and second user groups 100A and 100B. Alternatively the first and second user groups 100A and 100B may be geographically disparate and access the network 100 through multiple APs, not shown for clarity, distributed geographically by the network operator or operators. First cellular AP 195A as show provides coverage to first user group 100A and environment 170, which comprises second user group 100B as well as first user group 100A. Accordingly, the first and second user groups 100A and 100B may according to their particular communications interfaces communicate to the network 100 through one or more wireless communications standards such as, for example, IEEE 802.11, IEEE 802.15, IEEE 802.16, IEEE 802.20, UMTS, GSM 850, GSM 900, GSM 1800, GSM 1900, GPRS, ITU-R 5.138, ITU-R 5.150, ITU-R 5.280, and IMT-1000. It would be evident to one skilled in the art that many portable and fixed electronic devices may support multiple wireless protocols simultaneously, such that for example a user may employ GSM services such as telephony and SMS and Wi-Fi/WiMAX data transmission, VOIP and Internet access. Accordingly portable electronic devices within first user group 100A may form associations either through standards such as IEEE 802.15 and Bluetooth as well in an ad-hoc manner.
Also connected to the network 100 are Social Networks (SOCNETS) 165, first to third retailers 170A to 170C respectively, e.g. Best Buy™, Circuit City™, and Wal-Mart™, and first to second online retailers 175A and 175B respectively, e.g. Amazon™ and eBay™, as well as first and second servers 190A and 190B which together with others, not shown for clarity. First and second servers 190A and 190B may host according to embodiments of the inventions multiple services associated with a provider of data systems and data applications/platforms (DSDAPs); a provider of a SOCNET or Social Media (SOME) exploiting DSDAP features; a provider of a SOCNET and/or SOME not exploiting DSDAP features; a provider of services to PEDS and/or FEDS; a provider of one or more aspects of wired and/or wireless communications; an Enterprise 160 exploiting DSDAP features; license databases; content databases; image databases; content libraries; customer databases; websites; and software applications for download to or access by FEDs and/or PEDs exploiting and/or hosting DSDAP features. First and second primary content servers 190A and 190B may also host for example other Internet services such as a search engine, financial services, third party applications and other Internet based services.
Accordingly, a consumer and/or customer (CONCUS) may exploit a PED and/or FED within an Enterprise 160, for example, and access one of the first or second primary content servers 190A and 190B respectively to perform an operation such as accessing/downloading an application which provides DSDAP features according to embodiments of the invention; execute an application already installed providing DSDAP features; execute a web based application providing DSDAP features; or access content. Similarly, a CONCUS may undertake such actions or others exploiting embodiments of the invention exploiting a PED or FED within first and second user groups 100A and 100B respectively via one of first and second cellular APs 195A and 195B respectively and first Wi-Fi nodes 110A.
Now referring to
The electronic device 204 includes one or more processors 210 and a memory 212 coupled to processor(s) 210. AP 206 also includes one or more processors 211 and a memory 213 coupled to processor(s) 210. A non-exhaustive list of examples for any of processors 210 and 211 includes a central processing unit (CPU), a digital signal processor (DSP), a reduced instruction set computer (RISC), a complex instruction set computer (CISC) and the like. Furthermore, any of processors 210 and 211 may be part of application specific integrated circuits (ASICs) or may be a part of application specific standard products (ASSPs). A non-exhaustive list of examples for memories 212 and 213 includes any combination of the following semiconductor devices such as registers, latches, ROM, EEPROM, flash memory devices, non-volatile random access memory devices (NVRAM), SDRAM, DRAM, double data rate (DDR) memory devices, SRAM, universal serial bus (USB) removable memory, and the like.
Electronic device 204 may include an audio input element 214, for example a microphone, and an audio output element 216, for example, a speaker, coupled to any of processors 210. Electronic device 204 may include a video input element 218, for example, a video camera or camera, and a video output element 220, for example an LCD display, coupled to any of processors 210. Electronic device 204 also includes a keyboard 215 and touchpad 217 which may for example be a physical keyboard and touchpad allowing the user to enter content or select functions within one of more applications 222. Alternatively the keyboard 215 and touchpad 217 may be predetermined regions of a touch sensitive element forming part of the display within the electronic device 204. The one or more applications 222 that are typically stored in memory 212 and are executable by any combination of processors 210. Electronic device 204 also includes accelerometer 260 providing three-dimensional motion input to the process 210 and GPS 262 which provides geographical location information to processor 210.
Electronic device 204 includes a protocol stack 224 and AP 206 includes a communication stack 225. Within system 200 protocol stack 224 is shown as IEEE 802.11 protocol stack but alternatively may exploit other protocol stacks such as an Internet Engineering Task Force (IETF) multimedia protocol stack for example. Likewise AP stack 225 exploits a protocol stack but is not expanded for clarity. Elements of protocol stack 224 and AP stack 225 may be implemented in any combination of software, firmware and/or hardware. Protocol stack 224 includes an IEEE 802.11-compatible PHY module 226 that is coupled to one or more Front-End Tx/Rx & Antenna 228, an IEEE 802.11-compatible MAC module 230 coupled to an IEEE 802.2-compatible LLC module 232. Protocol stack 224 includes a network layer IP module 234, a transport layer User Datagram Protocol (UDP) module 236 and a transport layer Transmission Control Protocol (TCP) module 238.
Protocol stack 224 also includes a session layer Real Time Transport Protocol (RTP) module 240, a Session Announcement Protocol (SAP) module 242, a Session Initiation Protocol (SIP) module 244 and a Real Time Streaming Protocol (RTSP) module 246. Protocol stack 224 includes a presentation layer media negotiation module 248, a call control module 250, one or more audio codecs 252 and one or more video codecs 254. Applications 222 may be able to create maintain and/or terminate communication sessions with any of devices 207 by way of AP 206. Typically, applications 222 may activate any of the SAP, SIP, RTSP, media negotiation and call control modules for that purpose. Typically, information may propagate from the SAP, SIP, RTSP, media negotiation and call control modules to PHY module 226 through TCP module 238, IP module 234, LLC module 232 and MAC module 230.
It would be apparent to one skilled in the art that elements of the electronic device 204 may also be implemented within the AP 206 including but not limited to one or more elements of the protocol stack 224, including for example an IEEE 802.11-compatible PHY module, an IEEE 802.11-compatible MAC module, and an IEEE 802.2-compatible LLC module 232. The AP 206 may additionally include a network layer IP module, a transport layer User Datagram Protocol (UDP) module and a transport layer Transmission Control Protocol (TCP) module as well as a session layer Real Time Transport Protocol (RTP) module, a Session Announcement Protocol (SAP) module, a Session Initiation Protocol (SIP) module and a Real Time Streaming Protocol (RTSP) module, media negotiation module, and a call control module. Portable and fixed electronic devices represented by electronic device 204 may include one or more additional wireless or wired interfaces in addition to the depicted IEEE 802.11 interface which may be selected from the group comprising IEEE 802.15, IEEE 802.16, IEEE 802.20, UMTS, GSM 850, GSM 900, GSM 1800, GSM 1900, GPRS, ITU-R 5.138, ITU-R 5.150, ITU-R 5.280, IMT-1000, DSL, Dial-Up, DOCSIS, Ethernet, G.hn, ISDN, MoCA, PON, and Power line communication (PLC).
Now referring to
Subsequently, the user 310 upon returning to a location 340, e.g. their home, office, family residence, place of work, etc. accesses DSDAP 360 via their PED or FED. In the first instance of the user accessing the DSDAP 360 the user creates an account using one of the methods known within the prior art wherein user registration data is stored upon one or more databases within DSDAP server(s) 390. Subsequently, the user 310 may access their account and manage assets and/or account information plus as described below in respect of
As depicted in
Subsequently, any firmware update, product recall, product upgrade information, etc. relating to an asset identified within one or more of the manufacturer, retailer, distributor, third party enterprise databases having one or more DSDAP 360 identities associated is transmitted to DSDAP 360 and its database(s) upon DSDAP server(s) 390. Notification(s) relating to affected assets by the firmware update, product recall, product upgrade information, etc. may then be communicated from DSDAP 360 to the user(s) 310. Accordingly, the user(s) 310 may elect whether to act upon the firmware update, product recall, product upgrade information, etc. or ignore, wait, etc. In this manner, user(s) 310 may be anonymous to the retail outlet 320, manufacturer, distributor etc. in respect of not having to provide electronic contact information, e.g. email address, SOCNET identity, etc., in order to obtain information regarding the firmware update, product recall, product upgrade information, etc. It would be evident to one skilled in the art that such methodologies as depicted and described in respect of
Optionally, the DSDAP 360 may allow a user 310 to establish preferences in respect of firmware update, product recall, product upgrade information, etc. including, but not limited to, automatically accepting firmware updates; establishing notifications to be provided at defined intervals e.g. weekly, monthly, etc.; establishing that notifications are only provided a predetermined wait time after their issuance, e.g. 1 day, 3 days, 1 week, etc.; and grouping notifications such as by category, type of notification, manufacturer, etc. It would be evident that some actions may, using selection tools known in the prior art, allow a user to select all assets, categories of assets, manufacturers, etc. to set preferences against. For example, a user may establish to automatically apply all updates from Microsoft for their software but receive monthly notifications for their other software and hardware.
Optionally, the notifications may be turned off by the user and rather than electing to receive notifications outlining the products/updates/upgrades they receive the actual updates/upgrades. In the latter case the user may find that updates/upgrades are automatically applied that they had wished were not but can at least schedule that updates/upgrades are provided at a time that suits them to allow their execution. In the former case then within the notification the user may select which updates to receive and implement. In this scenario non-installed/downloaded updates are tracked and provided as part of the next scheduled notification. In the event that an update is not successfully installed then the user may through their profile easily access the updates for the affected asset(s) and select to have these re-supplied. Further, in the event of an issue the user may through the DSDAP records ascertain all updates they accept/received and installed.
Accordingly, according to the embodiment of the invention described in respect of
Within the DSDAP the user may establish rules for the updating of firmware/software. In the instance of an application the DSDAP application allows the user to register products with themselves as the owner or caretaker of that product and then the user can set rules which dictate which products/manufacturers/distributors or other parties are able to either directly update the user's firmware and/or software or provide the updates/upgrades to the user.
Within an alternate embodiment of the invention the DSDAP receives notifications of updates/upgrades relating to products/assets including those of a specific user. As the DSDAP knows the specific owners of particular products affected by a product update/upgrade/recall and the rules for notifying/applying the product update/upgrade then the DSDAP acts as a gateway controlled through the DSDAP application installed upon the user's PED and/or FED. If the user elects to receive every notification without permitting automatic updates then their DSDAP application provides them with full brokering capabilities and the network 100, i.e. the Internet or cloud, acts as a resource highway. The DSDAP allows the user to keep ownership information private from the party/enterprise updating the asset.
As evident from
Now referring to
The retailer systems upon third remote server 480C, for example, may also be provided with additional information which is captured at this point of sale time with respect to the sale including, but not limited to, retailer service plan information, product basic warranty information, and an enhanced warranty plan purchased by the user. Subsequently, this information or a subset of this information may be provided to one or more third parties associated with these aspects of the purchase. For example, the manufacturer may be advised the user purchased an enhanced service plan provided by the manufacturer, a third party service plan provider to the retailer may be advised of the details of the new service plan, and a local service provider be advised of service plan details. In other embodiments of the invention periodic reminders may be automatically established in one or more of these enterprises as well as the user's electronic calendar(s), social media profiles/timelines etc. or within the APP itself.
Accordingly, in this embodiment of the invention with first to fourth product data 470A to 470D respectively relating to multiple asset manufacturers the DSDAP 360 now maintains records for the new purchases by the user 310 for these assets and asset manufacturers such that upgrades/updates etc. for all assets and asset manufacturers are maintained and scheduled in notifications according to the user settings. If the user in making these asset purchases associates a plan, including but not limited to a subscription plan, a warranty plan, a usage plan, and an upgrade plan, with one or more these assets 430 then the DSDAP 360 may also track the plan(s) such that the user can easily access them where necessary to get their asset replaced, repaired, upgraded etc. Where the plan has a renewal, e.g. an annual renewal, then the DSDAP 360 may provide reminder notifications to the user 310 or in other embodiments of the invention where the user 310 associates financial data, e.g. credit card data, with their account the DSDAP 360 may perform the renewal as the DSDAP 360 has all user data, financial data, and asset data.
Now referring to
Accordingly, these vendors on first to third websites 520A to 520C respectively are not providing data to the original asset manufacturer. Hence, upon receipt of the asset(s) from each purchase on the first to third websites 520A to 520C respectively the user accesses the DSDAP 360 to generate an entry for the asset by providing what information the user 310 possesses including, for example, manufacturer, model number, serial number, images captured of product labelling, product identification etc. Product labelling images are depicted as first to third images 570A to 570C respectively. Based upon the information provided by the user the DSDAP 360 may access one or more databases including, but not limited to, those on first to third remote servers 580A to 580C respectively relating to manufacturers, manufacturing reference databases etc. The DSDAP 360 may also access other databases including, but not limited to, product databases such as Wize™, UPC Database (e.g. www.http://upcdatabase.org/) etc.
Once the DSDAP 360 finds a matching product then it may engage with the manufacturer's databases and registration software to establish a registration in respect of the user's asset but protecting the user's personal data such that subsequently upgrades, updates etc. In some embodiments of the invention the DSDAP 360 may establish, based upon information provided by the user directly or acquired, for example, through the DSDAP 360 communicating to the asset, that the current firmware, software, upgrade status are out of date or behind the current versions from the asset manufacturer. Accordingly, the DSDAP 360 may provide the user with a specific notification relating to updating the asset to current manufacturer supported version(s) which may require that multiple historical upgrades are executed sequentially.
Now referring to
Accordingly, for example on Jun. 11, 2014 a user in Ottawa, Canada when accessing the Yahoo™ email splash screen would have been provided with an advertisement in respect of “Ready-to-Drink” tasting events being held by the Liquor Control Board of Ontario (LCBO) in Ottawa on Jun. 12-14, 2014. However, as the user 310 in this instance is registered with DSDAP 360 and has previously purchased a 4 Tb 3.5″ external hard drive from Kijiji™, first website 520A, a 50 ft Molded Cat6 Patch Cable from eBay™, second website 520B, and a Wireless 802.11n Router from digiCircle™, third website 520C. In this instance the user is presented with an advertisement from BestBuy™ relating to an AC1200 Wi-Fi Range Extender manufactured by Netgear™.
Accordingly, advertisements may be targeted based upon the historical asset acquisition profile of the user. Optionally, this may be correlated with other user asset histories such as those within a similar demographic, e.g. age, sex, race, religion, or combination thereof where that information has been provided or acquired by DSDAP 360 or with others having correlated asset histories. For example, users with historical asset purchases of multiple large screen TVs, gaming console(s), stainless steel appliances, etc. making asset acquisitions of a crib, baby clothing, etc. and owning vehicles within a particular portion of the car market have typically within 3-6 months made a change in their vehicle to one within a different portion of the car market, e.g. trading a compact for a SUV.
This is extended in Figures and 6B there is depicted an asset data relationship application according to an embodiment of the invention for content association to an asset or assets of a user. Accordingly, the user has established an account upon a DSDAP 360 and uploaded information relating to an asset 6010, in this instance a 2013 Jeep Rubicon, wherein this information is stored within DSDAP server(s) 390 for subsequent retrieval in respect of notifications, upgrades, recalls, updates etc. issued by the asset manufacturer, i.e. Jeep a division of Chrysler Group LLC. Subsequently, the user may during their other activities identify content that they wish to associate with an asset within their asset registry. This may be either as a result of accessing the content through the DSDAP 360 or within one or more applications whilst the DSDAP 360 is in execution in background for linking for example. Alternatively the DSDAP 36-0 may establish a toolbar within an Internet browser, for example, to provide tools for the user to select and associate content with an asset. Accordingly, the user can associate an item of electronic content, e.g. song, image, video, website, document, link, hyperlink, etc. to an asset, e.g. asset 6010. As depicted in
Subsequently as depicted in
Accordingly, a user may as they are browsing, searching, etc. on the Internet may attach that item to an asset within the DSDAP. The user may attach with one of several methods including, but not limited to, voice command, tap to link, and copy and paste. In this manner, rather than the user maintaining a large number of bookmarks or losing reference to items of interest they can associate the content to an asset. Accordingly, in the example depicted in
It would also be evident that the association made by the user of content to an asset may include additional information such as the context of the user at the time of the association which may include, geolocation, user context (e.g. home, work, garage, mall, etc.), whether associated with user alone or with family, friends, etc. as well as potentially biometric sensor data and/or lifestyle monitoring data.
For example, consider that 17,000 consumers all connect a single item of electronic content to the same asset, e.g. GE 25.9 cubic foot Side-by-Side Refrigerator, or a same brand/category of asset, e.g. GE and refrigerator, and that item was a news feed relating to bad fridge water in automatic ice makers. This information is now highly valuable to GE as evidently a large number of owners of their refrigerators are concerned by this news item. Accordingly, GE can take action to all of that category's asset owners or to only those who have made the association with the DSDAP. This information may also be important to a third party enterprise, e.g. a competitor, or a supplier of ice making systems to GE for example.
As noted above this linking may be performed in one or more manners including, for example, the user highlights what they wish to attach (or right click on webpage or choose a browser plug-in button or button) and select “Attach to SoloID”, wherein SoloID, operating the service to store this relationship, is a DSDAP provider based in Ontario, Canada. As noted above the user may identify the asset to which the association is made, or elect to “like”, save, store or copy the data to the DSDAP wherein this information is related back to the user's assets. Alternatively, a DSDAP algorithm parses the electronic content identified by the user, e.g. article, website, image, video, etc., in order to extract keywords which may match a product name, product manufacturer, model number, product category, etc. wherein a match to an asset of the user within the DSDAP will automatically the electronic content to their asset. For example, an article including keywords “Ford” and “Mustang” will attach that article to the Ford Mustang asset in the user's DSDAP so that they can review it subsequently or have a future reference to it. If the article does not match to a single asset but multiple, e.g. the article is about Ford, then it prompts the user “Which Asset? The Mustang or Escape?” where it detects multiple match options. If there is no correlation, e.g. the article is about wood fired AGA cooking/heating ranges then it may prompt the user to add to an asset within an associated category, e.g. kitchen, or whether a new asset is to be created wherein subsequently the user when completing the purchase of a range may be asked whether to associate the previously generated asset that has no asset details to the newly purchased asset. In this manner a user may create references to a new asset prior to its actual purchase. Such information is also important to retailers, marketers, advertisers, etc.
It would be evident to one skilled in the art that in a similar manner as the knowledge of the asset(s) and electronic content associated by the user are important to advertisers, marketing enterprises, retailers, etc. that this information can also be leveraged to improve the content/relevancy of electronic content identified during a search for the user. Accordingly, the DSDAP knows whether a user has linked content to their product and as evident from other embodiments of the invention described below in respect of
Accordingly, the DSDAP may by connecting facts such as that a user watched, liked or saved a video to their asset, or just watched it and maybe rated it, become an Internet resource allowing others to establish which videos are either valid/related or viewed as appropriate/good in respect of solving an issue on the Honda 545 Lawnmower. For example, if videos from one series posted by a retailer, e.g. Home Hardware, are consistently associated with Honda 545 Lawnmowers by owners/users then this information is now relevant to other search engines relationships as perhaps these videos were not the most viewed and hence under normal search algorithms would not appear as high but in fact these are the most highly rated by owners of the actual asset rather than the entire global population searching and browsing. Accordingly, this information would allow other search engines, e.g. Yahoo™, Google™, and Bing™ to increase the relevancy of the results to users overall and significantly increase this relevancy where the user also owns that asset. Accordingly, if the user enters “How to replace cutting blade” rather than returning all search results that fit with the normal algorithms being applied the search engine may establish that the user owns a Greenworks lawnmower and hence automatically weights results to this with a simple option block at the top of the page as currently appears where a search result slightly different to the one entered by the user is performed. So, for example, the user is presented with filtered results for Greenworks lawnmowers but the top of the results says “Filtered for Greenworks lawnmowers. OK?” with simple option of click “No” if not and simply proceeding with displayed list if it is OK.
The search algorithm(s) may also consider the fact that a user did not like a video or item of electronic content, and accordingly may push those and similar search results down the search result listing. Optionally, they may be discarded.
Now referring to
Subsequently, the user accesses a website/webpage 750 relating to a manufacturer and provides a posting onto the website/webpage 750. As this process is performed the DSDAP identifies that the manufacturer associated with the website/webpage 750 matches a manufacturer of one or more assets of the user as being from that manufacturer. Accordingly, this information is provided to the website/webpage 750 together with data relating to the posting/content added by the user. In this manner the website/webpage 750 can establish that the user is a verified owner of an asset or assets manufactured by the manufacturer associated with website/webpage 750 or even more specifically the category/product of website/webpage 750 wherein the website/webpage 750 is specific to category/product. However, as the DSDAP is performing these steps the associations are made in a manner that the user remains anonymous from the manufacturer and the DSDAP allows connections to be established relating to verified purchases from unrelated parties. Accordingly, as depicted a first posting 760 is associated with a verified/validated user whereas second posting 765 is not a verified/validated user. Accordingly, another user when viewing the website/webpage 750 may see the status of the different posters and make a judgment as to the validity of the comments by each.
Additionally, for a verified/validated user the website/webpage 750 may provide additional information according to preferences established by the user associated with the post such as the assets the user owns, the history of the user, and other posts of the user. Accordingly, a user owning Apple products is potentially more reputable than another user posting comments about Apple products that does not own them and similarly comments about an Apple TV when the user only owns an Apple iPod Nano™ has potentially little merit or validity. These concepts are extended in
Now referring to
Further, where the DSDAP 360 has the identities of the part(s) required it may perform a search in order to identify options for acquiring the part(s) for the user. Accordingly, based upon the location of the user the DSDAP 360, may, within the DSDAP databases upon DSDAP server 390 have established retailers associated with specific products/service/assets and/or categories of assets/service/products or it may dynamically establish these based upon a search through a mapping resource such as Google™ Maps, Yahoo™ Maps, Bing™ Maps, MapQuest™ etc. Optionally, such a search may be employed to associate retailers and retail locations for a user for subsequent storage/retrieval/use. Alternatively, the requirement for the part(s) may be stored and the DSDAP dynamically searches based upon establishing that the user is now within a retail environment supplying the part(s) or a subset of the parts. In the embodiment depicted in
Alternatively, warranty or subscription information may be stored such that a predetermined period of time prior to the expiration the DSDAP may look for a new warranty renewal price or subscription plan pricing and provide the user with a notification not only of an impending expiry but also with one or more offers to extend the warranty or subscription.
Once, the associations have been made then the user may be provided with a notification via DSDAP 360 such as notification 960 in
-
- Notification Data 970—“HP7500 printer low on magenta, yellow, and cyan inks”;
- Location Data 980—“The Staples store you are in has all three in stock and on sale”; and
- Product Data 990—indicating the part required, a visual of the packaging if available, and pricing information.
Optionally, some retailers may also be able to provide the DSDAP 360 with in-store location information to help guide the user quickly to the required part(s). Alternatively, the notification 1050 as depicted in
-
- Notification Data 1060—“HP7500 printer low on inks”;
- Location Data 1070—“This Grand&Toy has only cyan and magenta. But Rideau Centre has all three in stock and on sale”;
- Selection Data 1080—providing the user with options to “Reserve” (as the store offers an online reservation for products) and “Directions” (providing the user with directions to the store indicated as having stock); and
- Map Data 1090—providing a visual indication of the user's current location and the location of the other store.
Optionally, Selection Data 1080 may include other options in addition to or instead of those depicted in
-
- Notification Data 1020—“HP7500 printer low on inks”
- Message Data 1030—“No local stores have these all in stock. Lowest online price is Staples. Do you want to order?”
- Option Data 1040—providing the user with options to confirm and place an order or not place an order.
Optionally, the user may be provided with the notification(s) through one or more applications including, but not limited to, the DSDAP 360 in execution upon their PED/FED. Other applications may include email, social media, etc. as well as where the DSDAP 360 is in execution or not a pop-up window on their FED/PED with or without an audible or visible message/notification.
Optionally, the user may configure the DSDAP 360 to automatically order any part(s) identified by the asset. It would be evident also that the user may, when purchasing an asset, establish within the DSDAP 360 an option for the DSDAP 360 to automatically order those part(s) necessary for maintenance of the asset according to the maintenance schedule/replacement schedule etc. of the asset manufacturer. In instances where the user purchases the asset used then they may also, if the previous owner of the asset was also registered with the DSDAP, receive information regarding previous activities associated with the asset. It would be evident that a user may also associate with an asset images of the spare parts acquired with their identity/serial no. information etc. or may alternatively add these as an asset itself allowing all of the other features of the DSDAP to be applied to it. For example, a replacement exhaust for their Ford Mustang might be tracked.
Optionally, the DSDAP allows a user to associate assets into a group/cluster/family. Optionally, the DSDAP would also allow a user to manage assets for a number of users, e.g. a parent may manage assets for their children but their accounts are subsequently separable, e.g. as they reach 18 years of age for example. Alternatively, a user may transfer assets from one account to another or allow them to subsequently transfer assets to a family member as they turn 18 for example. Alternatively transfer of an asset may be made from a seller's DSDAP account to a buyer's DSDAP account such that upgrade/update/service history may be similarly transferred to the buyer. In these instances the option to delete personal content associated with the asset may be provided to the user. Alternatively, when content is added to an asset it may be categorized into one of several categories, either automatically provided by the DSDAP or created by the user, which can may include personal, general, service, etc. such that by default only the maintenance record is transferred unless the seller/user making the transfer approves transfer of the personal and/or general elements.
Accordingly, it would be evident that in embodiments of the invention anonymous product ownership may be established so that other users/data partners to the DSDAP may access data relating to a particular asset to answer a query or return results for a search/query. For example, a query to the Home Depot website “What Oil should I buy from Home Depot?” results in the Home Depot's website shopping application now being able to read the DSDAP database, ascertain what products the query initiator has, and now knows what products the user has have that require oil and returns results. As the DSDAP knows the user's assets then optionally this process acquires recommendations from either one or all of the asset's manufacturer, a distributor, a retailer or a third party known to have related information, and can also engage another server to make recommendations from other users with the same or a similarly related asset in order to make the best recommendation. It could also look to what other oil was “liked” by the same product owners, so a new suggestion from others can be incorporated into the results. The “like” can also come from another database, so that in essence the DSDAP may establish an overall sentiment of other like owners of the same asset and the parts that these other users like rather than being limited to a single viewpoint from a single website. In these latter instances the DSDAP user identities are kept anonymous whereas in the first query the user may identify to the Home Depot website that are a DSDAP user and provide a unique identifier provided to them from the DSDAP or at user's suggestion which means the DSDAP knows who the user is but the Home Depot software system do not.
Within other embodiments of the invention a product timeline may be established. One example being that depicted in
As a user associates additional content to their asset then by virtue of electing whether to share/publish or maintain as private the content that they provide then their externally viewable timeline associated with an asset may adjust to reflect the shared or published content whilst the user's own timeline will evolve to include all the associated content/data. In the event that a third party is associating data, e.g. a new warranty for the user's washing machine then the user may be prompted to determine whether to add or keep private that information. Alternatively, the user may have established rules for adding content and/or modified or merely accepted rules within the DSDAP relating to the inclusion of content within private and public timelines.
Whilst
The asset a user adds can be linked to their loyalty card and the user can add notes to the assets on their loyalty card or flag the item as having an issue or rate the asset and the loyalty card maker can see this information either through public feeds of that user's assets, either anonymously or not, or through acquiring a subset of data they read from the user's loyalty card or from another source which is getting access to this data.
Optionally, where within the DSDAP an upgrade/update notification relates to an asset of a user then the notification may itself become part of the timeline of the product and may be similarly pushed to one or more SOCNETs with or without the association of the asset to the SOCNET(s). Accordingly, a user may access their Facebook™ page, for example, and see a notification relating to their Microsoft™ Office suite that a new service pack is available. Alternatively, the user may be following a communal online asset specific product feature, e.g. a Twitter account (i.e. @HP7500 for a HP7500 Wide Format Printer or @FordEdge for the Ford™ Edge vehicle). As a result the DSDAP may display a real-time running list of all posts, links and images attached to an asset, so this is either the user or a company can be following in real-time per item feed of data as well as establishing historical analysis. Selection of the notification and/or confirmation of the update/upgrade may in addition to triggering the required downloading/installation etc. of firmware/software updates add the date/time together with update/upgrade to the timeline of the asset so that subsequently the user can see the sequence of updates/upgrades. It would be evident that subsequently other users within the SOCNET(s) may therefore friend, follow, subscribe, like, etc. the asset and/or its associated timeline etc.
As discussed in respect of
It would be evident that the concepts disclosed with the embodiments of the invention also provide the ability for a retailer to give a user an exclusive “buy it now offer” price which is confidential only to that user and potentially specifically priced for that user. For example, a user assets may overlap heavily with a retailer in terms of spares, replacement parts, etc. and accordingly attracting the user has a benefit to the retailer. Accordingly, the DSDAP may in essence broker a better deal because the retailer now knows the user assets and requirements and their timing so can provide an offer geared to those specific requirements. Further, the DSDAP may communicate to the retailer with or without the user's intervention. For example, the retailer now knows that the user should be, in addition to purchasing replacement wiper blades for their Ford Mustang, scheduling an oil change/brake replacement in 2 weeks. Accordingly, the retailer can offer a deal to secure the oil change/brake replacement and schedule this rather than leaving the second aspect unaddressed and within the prior art unknown. Optionally, the DSDAP may “negotiate” and reject an offer. The retailer may submit a new offer, especially if knowing the geolocation and/or other information, impacts the decision of the user. Equally, where a user wishes to dispose of an asset then the DSDAP may negotiate the same as the user undertakes other activities that, for whatever reason, leads them to retailers who purchase assets of the category/type they are seeking to dispose. Accordingly, for example, a user may wish to dispose of a TV and when entering Wal-Mart™ is made an offer on a new TV including a sale of the user's current asset to Wal-Mart™ or the offer is only an asset disposal and store credit. The store credit may be higher than the cash value the retailer offers as they know they are then completing the sale of one or more other assets.
Such concepts may be extended to include what may be referred to as “Anonymously Intent Casting” wherein the DSDAP, based upon the knowledge of the user's assets and their status/requirements may establish an offer or offers in respect of a need/requirement without the user being engaged or even knowing that they have the need/requirement at that point in time. Accordingly, the DSDAP may determine the need for something, e.g. either by a refrigerator notifying the DSDAP of the requirement or it being established upon a schedule/notification, and obtaining data relating to satisfying the requirement/need. The extent of the requirement/need may be very broad based upon the user such that, for example, a user with a lawnmower may establish a schedule for lawn cutting and the application seeks offers to provide that service to the user. The asset may, alternatively, be the lawn rather than a lawnmower as the user expects the successful bidder to provide this service on the lawn.
Within embodiments of the invention the DSDAP may anonymously place the user's requirement/need upon one more web sites, web services, wherein it is bid on by suppliers rather than the DSDAP simply collecting pricing information from multiple retailers online. Optionally, the user may control which suppliers are able or allowed to bid. The received bids are collected, collated, filtered, etc. as appropriate before the user is presented with only the “appropriate” or relevant “offers” meeting their criteria.
Within embodiments of the invention variations may include, but are not limited to, the following:
-
- 1: The DSPAP may preselect one or more suppliers, receive data, notify the user to review and optionally accept and even pay for the item and have it shipped;
- 2: A user may be ranked as a good buyer, based on your ownership/purchase ranking by suppliers or by manufacturers proving they are an owner of certain products based on accepted warranty registrations;
- 3: A user may exploit friends to a predetermined degree of “depth” to establish suppliers they like/rate highly so that the system accepts bids only from them, or weights the “offer” based upon their rating(s);
- 4: Bids may be accepted from suppliers trying to offer a reduction or even give something away free as they wish to establish access to your friends;
- 5: Ranking of you (a Buyer) is based on “Vetted Ownership” rating by suppliers;
- 6: Suppliers can be ranked based upon “Vetted Ownership” ratings from other users and/or those of friends or those within predefined geographical region(s);
- 7: Algorithms may be tuned and information joined with other algorithms and data sources internally and externally to consider a user's weightings;
- 8: Algorithms may be triggered to accept deals that are more than a predetermined percentage and/or value lower than lowest price notified by retailers within the user preferences even if the offering retailer is outside those preferences. Such an offer may for example be generated based upon the retailer seeing the user's vetted buyer rating (or points within a system of vetted ownership profile) so that they wish to become a retailer the user selects/uses.
As the DSDAP possesses within its database(s) a list of assets by user then the DSDAP also offers users with a system that can act as the central clearing for addressing issues such as lost, found, stolen, recovered assets. Within the prior art the use of identification tags and reward offers is the most well-known and prevalent method for returning lost objects to their owners. For example, tags may be placed on luggage, cell phones, computer equipment, or any object capable of being lost, and making it possible for the finder to locate the owner to arrange for return and possible reward by the owner to the finder. However, such identification tags have certain disadvantages, for example, they may reveal the owner's name, address, and possibly phone numbers, causing loss of privacy and security risks. Many owners will not use identification tags which reveal their true names, etc., because the risk of unethical people misusing that discovering and misusing that information is too high.
Accordingly, encoding the information whilst it provides identity and data protection requires that the user register with a third party, and for the finder to return the lost object to the third party who, in turn, returns the lost object to the owner. Many such prior art techniques have included exploiting bar codes, RFID stickers, and attaching other elements to the asset wherein the user assigns the unique identity of the tag, label, etc. to the asset within the third party database. However, an individual finding an item may access a DSDAP according to an embodiment of the invention and enter data relating to the asset found which may be a tag, label, etc. as within the prior art but alternatively may simply be a serial number of the product which is then processed by the DSDAP to identify a matching asset within the database wherein the user associated with the asset may be contacted by the DSDAP. Based upon a response provided by the user associated with the asset several options may be triggered including, but not limited to, the following:
-
- Establishing electronic communication between user and individual to schedule/manage return of the asset;
- Providing a printable courier/postal label for the individual to attach wherein the delivery information is only provided to the courier/postal service once the DSDAP is advised the asset with the label attached is entered into the courier/postal service system; and
- Arranging for the individual to drop the asset at a partnership retailer to the DSDAP wherein the partnership retailer arranges for the asset to be dropped off at a retail outlet close to the individual and transferred to a retail outlet close to the user for collection wherein the partnership retailer may charge a fee or view the partnership with the DSDAP as part of their overall marketing and customer awareness/retention activities.
It would be evident that such methodologies may also be employed by authorities, insurance companies etc. to locate the owners of recovered assets.
Within
Within many aspects of embodiments of the invention as well as other applications, software suites etc. a user is required to enter text. Today, this is achieved either by providing the user with a scrollable list of predetermined options that are triggered through selecting an icon next to the blank/defaulted text field or the user typing the keyword. In the former instance the software application is configured with the lists and accordingly the user cannot select options outside the preconfigured list. However, according to an embodiment of the invention, an application may provide an overlay to another software application wherein when the user wishes to enter text into a field they touch the screen within the field and hold. A word, e.g. “Select” comes up, and unless the user moves their finger disappears and no action is performed. If the user moves their finger, for example, up/down or left/right then the text within the field appears to scroll. It may, for example, default to starting with the letter M, or alternatively, A or Z or another letter the application determines as appropriate. A small finger movement scrolls the list slowly and a larger movement faster. Once the appropriate keyword is found and the user stops touching the screen. The selected word is then parsed to the application with the text field as the selected option. Accordingly, rather than all software applications having to update their scroll list options only one is updated and accessed by all software applications. The available options within the scroll list can be contextually defined by the software application requiring the text entry. Hence, within an application “Car Make” may be displayed and the user scrolls until they select Ford™. Next they touch the “Model” field and the contextually aware interface now displays a list of Ford™ vehicles allowing the user to select Escape. However, if the user was within a car dealership website then the list would be today's available models but within the DSDAP wherein an asset may be any prior or current Ford then the list would be significantly longer as indeed the list of car makers would include manufacturers no longer in existence or brands subsumed by re-branding etc.
Within many SOCNETs and other applications linkage to a Twitter feed/comment etc. is provided. Twitter gained popularity from limiting messages to 140 characters. However, according to some embodiments of the invention a user making a posting may not wish everyone to see all the content and accordingly it would be beneficial to provide users within the DSDAP and other applications with the ability to embed additional information within the Tweet or other communication that they post. Accordingly, as indicated in
Within an alternate embodiment of the invention the user may initially post the message with the glyph and associate with the message a time limit which if the user does not remove or cancel, for example, will result in the message being re-posted with the glyph decrypted and posted for all to view. Accordingly, the user may tweet a message regarding an issue, for example with Verizon's cellular service, and if the user does not cancel it then the glyph is decrypted. However, as noted supra the posting may have been made anonymously and the exploded glyph whilst exposing the issue maintains the user's anonymity.
As evident from
Specific details are given in the above description to provide a thorough understanding of the embodiments. However, it is understood that the embodiments may be practiced without these specific details. For example, circuits may be shown in block diagrams in order not to obscure the embodiments in unnecessary detail. In other instances, well-known circuits, processes, algorithms, structures, and techniques may be shown without unnecessary detail in order to avoid obscuring the embodiments.
Implementation of the techniques, blocks, steps and means described above may be done in various ways. For example, these techniques, blocks, steps and means may be implemented in hardware, software, or a combination thereof. For a hardware implementation, the processing units may be implemented within one or more application specific integrated circuits (ASICs), digital signal processors (DSPs), digital signal processing devices (DSPDs), programmable logic devices (PLDs), field programmable gate arrays (FPGAs), processors, controllers, micro-controllers, microprocessors, other electronic units designed to perform the functions described above and/or a combination thereof.
Also, it is noted that the embodiments may be described as a process which is depicted as a flowchart, a flow diagram, a data flow diagram, a structure diagram, or a block diagram. Although a flowchart may describe the operations as a sequential process, many of the operations can be performed in parallel or concurrently. In addition, the order of the operations may be rearranged. A process is terminated when its operations are completed, but could have additional steps not included in the figure. A process may correspond to a method, a function, a procedure, a subroutine, a subprogram, etc. When a process corresponds to a function, its termination corresponds to a return of the function to the calling function or the main function.
Furthermore, embodiments may be implemented by hardware, software, scripting languages, firmware, middleware, microcode, hardware description languages and/or any combination thereof. When implemented in software, firmware, middleware, scripting language and/or microcode, the program code or code segments to perform the necessary tasks may be stored in a machine readable medium, such as a storage medium. A code segment or machine-executable instruction may represent a procedure, a function, a subprogram, a program, a routine, a subroutine, a module, a software package, a script, a class, or any combination of instructions, data structures and/or program statements. A code segment may be coupled to another code segment or a hardware circuit by passing and/or receiving information, data, arguments, parameters and/or memory content. Information, arguments, parameters, data, etc. may be passed, forwarded, or transmitted via any suitable means including memory sharing, message passing, token passing, network transmission, etc.
For a firmware and/or software implementation, the methodologies may be implemented with modules (e.g., procedures, functions, and so on) that perform the functions described herein. Any machine-readable medium tangibly embodying instructions may be used in implementing the methodologies described herein. For example, software codes may be stored in a memory. Memory may be implemented within the processor or external to the processor and may vary in implementation where the memory is employed in storing software codes for subsequent execution to that when the memory is employed in executing the software codes. As used herein the term “memory” refers to any type of long term, short term, volatile, nonvolatile, or other storage medium and is not to be limited to any particular type of memory or number of memories, or type of media upon which memory is stored.
Moreover, as disclosed herein, the term “storage medium” may represent one or more devices for storing data, including read only memory (ROM), random access memory (RAM), magnetic RAM, core memory, magnetic disk storage mediums, optical storage mediums, flash memory devices and/or other machine readable mediums for storing information. The term “machine-readable medium” includes, but is not limited to portable or fixed storage devices, optical storage devices, wireless channels and/or various other mediums capable of storing, containing or carrying instruction(s) and/or data.
The methodologies described herein are, in one or more embodiments, performable by a machine which includes one or more processors that accept code segments containing instructions. For any of the methods described herein, when the instructions are executed by the machine, the machine performs the method. Any machine capable of executing a set of instructions (sequential or otherwise) that specify actions to be taken by that machine are included. Thus, a typical machine may be exemplified by a typical processing system that includes one or more processors. Each processor may include one or more of a CPU, a graphics-processing unit, and a programmable DSP unit. The processing system further may include a memory subsystem including main RAM and/or a static RAM, and/or ROM. A bus subsystem may be included for communicating between the components. If the processing system requires a display, such a display may be included, e.g., a liquid crystal display (LCD). If manual data entry is required, the processing system also includes an input device such as one or more of an alphanumeric input unit such as a keyboard, a pointing control device such as a mouse, and so forth.
The memory includes machine-readable code segments (e.g. software or software code) including instructions for performing, when executed by the processing system, one of more of the methods described herein. The software may reside entirely in the memory, or may also reside, completely or at least partially, within the RAM and/or within the processor during execution thereof by the computer system. Thus, the memory and the processor also constitute a system comprising machine-readable code.
In alternative embodiments, the machine operates as a standalone device or may be connected, e.g., networked to other machines, in a networked deployment, the machine may operate in the capacity of a server or a client machine in server-client network environment, or as a peer machine in a peer-to-peer or distributed network environment. The machine may be, for example, a computer, a server, a cluster of servers, a cluster of computers, a web appliance, a distributed computing environment, a cloud computing environment, or any machine capable of executing a set of instructions (sequential or otherwise) that specify actions to be taken by that machine. The term “machine” may also be taken to include any collection of machines that individually or jointly execute a set (or multiple sets) of instructions to perform any one or more of the methodologies discussed herein.
The foregoing disclosure of the exemplary embodiments of the present invention has been presented for purposes of illustration and description. It is not intended to be exhaustive or to limit the invention to the precise forms disclosed. Many variations and modifications of the embodiments described herein will be apparent to one of ordinary skill in the art in light of the above disclosure. The scope of the invention is to be defined only by the claims appended hereto, and by their equivalents.
Further, in describing representative embodiments of the present invention, the specification may have presented the method and/or process of the present invention as a particular sequence of steps. However, to the extent that the method or process does not rely on the particular order of steps set forth herein, the method or process should not be limited to the particular sequence of steps described. As one of ordinary skill in the art would appreciate, other sequences of steps may be possible. Therefore, the particular order of the steps set forth in the specification should not be construed as limitations on the claims. In addition, the claims directed to the method and/or process of the present invention should not be limited to the performance of their steps in the order written, and one skilled in the art can readily appreciate that the sequences may be varied and still remain within the spirit and scope of the present invention.
Claims
1. A method of verifying to a third party viewing online content relating to an asset is posted by a user who is the legitimate owner of the asset; the method comprising
- receiving, at a server, from the user first data uploaded from an electronic device associated with the user, the first data relating to an electronic receipt relating to the purchase of the asset;
- storing within a database accessible to the server an entry associated with an identity of the user, the entry comprising asset information relating to the asset purchased by the user identified within the electronic receipt;
- receiving, at the server, from the user second data relating to a webpage to which they wish to post content;
- receiving, at the server, from the user third data relating to content to be posted to the webpage;
- automatically establishing a manufacturer associated with the webpage to which the content is to be posted;
- determining whether the manufacturer is the manufacturer of the asset for which the entry exists within the database in dependence upon only the first data; and
- upon a positive determination transmitting from the server to the webpage the content and an indication that the user posting the content is a verified purchaser of the asset; wherein
- the indication transmitted with the content when rendered on the webpage with the content to the third party indicates that the user posting the content is a verified purchaser of an asset made by the manufacturer; and
- the first data uploaded from the electronic device extracted from the electronic receipt is a description of the asset acquired with that electronic receipt and is independent of any unique identifier of at least one of: the electronic receipt by a retailer issuing that electronic receipt of the plurality of receipts; and the manufacturer associated with the webpage to which the content is to be posted.
2. The method according to claim 1, wherein
- the determination as to whether the manufacturer is the manufacturer of an asset for which an entry exists within the database also includes determining whether the webpage to which the content is to be posted is associated with a product which matches the identified asset of the manufacturer.
3. The method according to claim 1, further comprising:
- transmitting upon the positive determination additional information established by the user associated with the content being posted to the webpage; wherein the additional information relates to one or more categories selected from one or more of assets owned by the user, a history of the user, and other posts made by the user; the webpage when posting the content also includes one or more links, each link associated with a category of the one or more categories to which the additional information relates.
4. The method according to claim 1, wherein
- the identity of the user remains anonymous from the manufacturer.
5. The method according to claim 1, further comprising
- receiving fourth data from the user relating to the content to be posted to the webpage, the fourth data relating to whether the user wishes to make a portion of the content to be viewable only by one or more predetermined entities rather than all viewers of the post; wherein
- upon determining the user wishes to make the portion of the content to be viewable only by one or more predetermined entities the server: encrypts the portion of the content into a plurality of glyphs, each glyph being encrypted with an encryption key or a plurality of encryption keys; transmits the plurality of glyphs with the remainder of the post for display by the webpage as part of the post; and transmits the encryption key or the plurality of encryption keys to the one or more predetermined entities.
6. The method according to claim 5, wherein
- at least one of: each glyph of the plurality of glyphs is one of a quick response code, a one dimensional bar code and a two dimensional bar code; and a glyph of the plurality of glyphs exploits colour coding such that it comprises at least a first code to be rendered in a first colour and a second code to be rendered in a second colour, each of the first code and second code relating to different item within the portion of the content to be viewable only by the one or more predetermined entities.
7. The system according to claim 5, wherein
- the first computer executable instructions when executed by the first microprocessor further configure the first server to: receive fifth data from the user relating to a time limit for that portion of the content the user wishes to be viewable only by one or more predetermined entities to be viewable by one or more predetermined entities; determine whether the time limit has passed without the first server receiving an indication from the user to remove or cancel that portion of the content; and upon a positive determination re-posting that portion of the content unencrypted so it is viewable by all users.
8. The method according to claim 1, further comprising
- encrypting a portion of the content into a plurality of glyphs, each glyph being encrypted with an encryption key or a plurality of encryption keys;
- transmitting the plurality of glyphs with the remainder of the post for display by the webpage as part of the post; and
- transmitting the one of the encryption key or the plurality of encryption keys to one or more predetermined entities; wherein
- one or more predetermined entities are established by the user as being able to view that portion of the content.
9. The method according to claim 8, wherein
- at least one of: each glyph of the plurality of glyphs is one of a quick response code, a one dimensional bar code and a two dimensional bar code; and a glyph of the plurality of glyphs exploits colour coding such that it comprises at least a first code to be rendered in a first colour and a second code to be rendered in a second colour, each of the first code and second code relating to different item within the portion of the content to be viewable only by the one or more predetermined entities.
10. The method according to claim 1, wherein
- the electronic receipt is the last in a series of electronic receipts; and
- the series of electronic receipts relate to a chain of title from the manufacturer of the asset to the user.
11. A system for displaying to a user of online content that a poster of an item of content relating to an asset within the online content is a legitimate owner of the asset by verification of the poster's asset with the manufacturer, the system comprising
- a first server connected to a communications network comprising a first microprocessor and a first memory storing first computer executable instructions for execution by the first microprocessor; and
- an electronic device also connected to the communications network associated with the user comprising a second microprocessor, a second memory storing second computer executable instructions for execution by the second microprocessor, and a display; wherein
- the first computer executable instructions when executed by the first microprocessor configure the first server to: store within a second memory accessible to the server database content to be rendered as online content; receive from the user a request for the online content; transmitting retrieved database content from the database in dependence upon the request; wherein a first portion of the retrieved database content comprises postings made by one of more other users; and a second portion of the retrieved database content comprises postings made by one or more further users and an indication for each posting within the second portion relating to a verification of the further user posting the content; and
- the second computer executable instructions when executed by the second microprocessor configure the electronic device to: render upon the display to the user the retrieved database content; wherein the first portion of the retrieved database content is rendered absent a visual marker; the second portion of the retrieved database content is rendered with a visual marker established in dependence upon the indication; and the visual marker indicates to the user that the other user posting content forming part of the second portion of the retrieved database content is a verified purchaser of an asset made by the manufacturer.
12. The system according to claim 11, further comprising
- a second server comprising a third microprocessor, a third memory storing third computer executable instructions for execution by the third microprocessor, and a third communications interface to connect the server to a communications network; wherein
- the third computer executable instructions configure the second server to: host a third social media application; receive first data uploaded by an individual from an electronic device associated with the individual connected to the communications network, the first data relating to one or more electronic receipts relating to the purchase of a plurality of assets; store within a database associated with an identity of the individual asset information relating to the plurality of assets purchased by the individual identified within the one or more electronic receipts; receive from the individual second data relating to a webpage to which they wish to post content; receive from the individual third data relating to content to be posted to the webpage; automatically establish a manufacturer associated with website to which the content is to be posted and determine whether the manufacturer is the manufacturer of an asset for which an entry exists within the database; upon a positive determination the second server transmits the content to the first server together with an indication that the individual posting the content is a verified purchaser of an asset made by the manufacturer; and upon a negative determination the second server transmits only the content to the webpage;
- the first computer executable instructions when executed by the first microprocessor further configure the first server to acquire the content to be stored within the database from the second server; and
- the first data uploaded from the electronic device was extracted from each electronic receipt of the one or more electronic receipts is a description of those assets of the plurality of assets acquired with that electronic receipt of the plurality of receipts and is independent of any unique identifier of at least one of: the electronic receipt of the plurality of receipts generated by a retailer issuing that electronic receipt of the plurality of receipts; and the manufacturer associated with the website to which the content is to be posted.
13. The system according to claim 11, wherein
- the determination as to whether the manufacturer is the manufacturer of an asset for which an entry exists within the database also includes determining whether the webpage to which the content is to be posted is associated with a product which matches the identified asset of the manufacturer.
14. The system according to claim 11, wherein
- the third computer executable instructions further configure the second server to: upon the positive determination transmit additional information established by the individual associated with the content being posted to the webpage; wherein the additional information relates to one or more categories selected from one or more of assets owned by the individual, a history of the individual, and other posts made by the individual; the webpage when posting the content also includes one or more links, each link associated with a category of the one or more categories to which the additional information relates.
15. The system according to claim 11, wherein
- the third computer executable instructions further configure the second server to: receive fourth data from the user relating to the content to be posted to the webpage, the fourth data relating to whether the user wishes to make a portion of the content to be viewable only by one or more predetermined entities rather than all viewers of the post; wherein upon determining the user wishes to make the portion of the content to be viewable only by one or more predetermined entities the server: encrypts the portion of the content into a plurality of glyphs, each glyph being encrypted with an encryption key or a plurality of encryption keys; transmits the plurality of glyphs with the remainder of the post for display by the webpage as part of the post; and transmits the encryption key or the plurality of encryption keys to the one or more predetermined entities.
16. The system according to claim 15, wherein
- at least one of: each glyph is one of a quick response code, a one dimensional bar code and a two dimensional bar code; and a glyph of the plurality of glyphs exploits colour coding such that it comprises at least a first code to be rendered in a first colour and a second code to be rendered in a second colour, each of the first code and second code relating to different item within the portion of the content to be viewable only by the one or more predetermined entities.
17. The system according to claim 15. wherein
- the third computer executable instructions when executed by the third microprocessor further configure the second server to: receive fifth data from the user relating to a time limit for that portion of the content the user wishes to be viewable only by one or more predetermined entities to be viewable by one or more predetermined entities; determine whether the time limit has passed without the first server receiving an indication from the user to remove or cancel that portion of the content; and upon a positive determination re-posting that portion of the content unencrypted so it is viewable by all users.
18. The system according to claim 11, wherein
- one of: all postings within the retrieved database content are transmitted and rendered with a plurality of glyphs; all postings within the second portion of the retrieved database are transmitted and rendered with the plurality of glyphs; and postings made by a specific individual forming part of the postings within the second portion of the retrieved content are transmitted and rendered with the plurality of glyphs;
- each glyph of the plurality of glyphs is encrypted with an encryption key or a plurality of encryption keys; and
- the systems transmits the encryption key or the plurality of encryption keys to the user who is one of a plurality of predetermined entities authorised to decrypt the plurality of glyphs.
19. The system according to claim 11, wherein
- the electronic receipt is the last in a series of electronic receipts; and
- the series of electronic receipts relate to a chain of title from the manufacturer of the asset to the user.
20. A system for verifying to a third party associated with online social media content that a poster of content relating to an asset is a legitimate owner of the asset; the system comprising
- a server comprising a first microprocessor, a first memory storing first computer executable instructions for execution by the first microprocessor, and a first communications interface to connect the server to a communications network; wherein
- the first computer executable instructions when executed by the first microprocessor configure the server to: host a social media application; receive from a user first data uploaded by the user from an electronic device associated with the user connected to the communications network, the first data relating to one or more electronic receipts relating to the purchase of a plurality of assets; store within a database associated with an identity of the user asset information relating to the plurality of assets purchased by the user identified within the one or more electronic receipts; receive from the user second data relating to a webpage to which they wish to post content; receive from the user third data relating to content to be posted to the webpage; automatically establish a manufacturer associated with the website to which the content is to be posted and determine whether the manufacturer is the manufacturer of an asset for which an entry exists within the database in dependence upon only the first data; wherein upon a positive determination the server transmits the content to the webpage together with an indication that the user posting the content is a verified purchaser of an asset made by the manufacturer; upon a negative determination the server transmits only the content to the webpage; the webpage upon rendering the content to the third party displays a visual marker in association with the rendered content that the user posting the content is a verified purchaser of an asset made by the manufacturer, the visual marker being displayed when the indication is present; and
- the first data uploaded from the electronic device was extracted from each electronic receipt of the one or more electronic receipts is a description of those assets of the plurality of assets acquired with that electronic receipt of the plurality of receipts and is independent of any unique identifier of the manufacturer associated with the website to which the content is to be posted.
21. The system according to claim 11, wherein
- the electronic receipt is the last in a series of electronic receipts; and
- the series of electronic receipts relate to a chain of title from the manufacturer of the asset to the user.
Type: Application
Filed: Jul 29, 2022
Publication Date: Dec 1, 2022
Patent Grant number: 11995662
Inventor: STEVEN HULAJ (KANATA)
Application Number: 17/816,244